Quick synopsis:
The guys on my team have been working on a production database (sql server 2005). We've added various things such as constraints, added triggers, etc.
Now we've found that someone or something has been rolling back our changes at various times. Problem is we all share a common admin login. (dumb, yeah I know, we're fixi...
Hi community,
I'm currently building a website that allows public access after classic verification methods (captcha + email verif.) I do my best to sanitize all of the inputs and stay in control of the data flows. I am 100% sure that there will be people / bots who will try to hack the system away : changing post values, trying to inse...
I have a console application references assembly A. I want to ensure that the application will not run if A.dll is tampered or replaced.
One option is to use strong-name signing. But do I need to worry about strong name bypass?
Are there any other good options?
Thanks
...
Hello,
I feel sorry, if this post isn't related here. If you feel this post is useless act according to your wish
My question is why don't we save the visitors(subscribers) cookie information in DB rather than setting a file on user's machine.Yeah, I know I might sound silly for following reasons
1) Maintaining DB for every single ...
Hi,
I am not sure ,
in my site lot of dummy entry from this URL
http://207.46.192.232/bvsandbox.aspx?
This user increase traffic.
Can you tell me, is this a hacker's URL?
...